Damn Vulnerable Thick Client App
☆155Jul 16, 2020Updated 5 years ago
Alternatives and similar repositories for dvta
Users that are interested in dvta are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn Vulnerable Thick Client App developed in C# .NET☆177Aug 17, 2023Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆147Jan 23, 2024Updated 2 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆107Jan 9, 2024Updated 2 years ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆458Dec 6, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.☆357Dec 19, 2025Updated 3 months ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15Mar 3, 2026Updated 3 weeks ago
- ☆23Apr 8, 2015Updated 10 years ago
- Nodejs application intentionally vulnerable to SSRF☆42May 12, 2023Updated 2 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- OWASP WebGoat.NET☆247Dec 16, 2023Updated 2 years ago
- An intentionally designed broken web application based on REST API.☆579Jun 10, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Database of websites for penetration testing☆183Jan 15, 2020Updated 6 years ago
- Web Application Security☆131Jan 6, 2026Updated 2 months ago
- Damn Vulnerable NodeJS Application☆766Mar 27, 2024Updated 2 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆97Nov 12, 2013Updated 12 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- Hackish way to intercept and modify non-HTTP protocols through Burp & others.☆622Mar 10, 2026Updated 2 weeks ago
- Enumeration and reconnaissance activities in the Microsoft Azure Cloud.☆254Feb 20, 2019Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- BurpJDSer-ng☆29Mar 19, 2026Updated last week
- jackson-databind-exploit☆13Mar 22, 2019Updated 7 years ago
- ☆663Oct 31, 2022Updated 3 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Jun 7, 2014Updated 11 years ago
- frown (frida-own) – an instrumentation challenge☆25Jan 20, 2024Updated 2 years ago
- Vulnerable OTP/2FA Application written in PHP using Google Authenticator☆87Nov 13, 2019Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆136Sep 25, 2019Updated 6 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Feb 27, 2021Updated 5 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,907Sep 27, 2021Updated 4 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Oct 14, 2020Updated 5 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago